| Sri Pooja Hruthi - Azure DevOps Engineer / SRE |
| [email protected] |
| Location: Frisco, Texas, USA |
| Relocation: Yes |
| Visa: Green Card |
| Resume file: Sri Pooja hruthi_1770935054370.docx Please check the file(s) for viruses. Files are checked manually and then made available for download. |
|
Sri Pooja
Azure DevOps Engineer | SRE Email: [email protected] Phone: +1 469-269-6609 LinkedIn: https://www.linkedin.com/in/sripooj/ PROFESSIONAL SUMMARY Results-driven Azure DevOps Engineer with 11+ years of experience in designing and automating enterprise applications, specializing in Dynamics 365 CRM, Power Platform, and Azure Cloud. Strong expertise in building and managing CI/CD pipelines with Azure DevOps (YAML, PowerShell) for CRM solutions, Power Pages, Data Factory, and Azure Functions. Skilled in designing and managing Azure IaaS and PaaS services (VMs, VNETs, App Services, AKS, Key Vault, Storage, SQL MI) with a focus on scalability, performance, and cost optimization. Proficient in CI/CD automation using Azure DevOps, GitHub Actions, and Jenkins, integrating compliance checks, policy enforcement, and security scans into pipelines. Designed and implemented GCP infrastructure leveraging services such as GKE, Cloud Storage, Cloud SQL, VPC, Cloud Run, Cloud Build, Cloud Functions, IAM, and Secret Manager, aligned with Azure s AKS, App Services, and Key Vault frameworks. Built secure, scalable hybrid-cloud environments integrating Azure and GCP using Terraform and Ansible, ensuring consistent deployment patterns and compliance across clouds. Automated network provisioning and IAM policy enforcement for both Azure and GCP using Terraform modules and YAML-based templates. Experienced in Azure monitoring and observability leveraging Azure Monitor, Log Analytics, Application Insights, and Sentinel, enabling proactive incident detection and resolution. Experienced Site Reliability and Observability Engineer with hands-on expertise in Datadog APM, Infrastructure Monitoring, Log Management, and Distributed Tracing, driving full-stack visibility and proactive incident response across cloud and hybrid environments. Skilled in instrumenting applications and services with Datadog agents and OpenTelemetry, designing dashboards, alerts, and SLO/SLI metrics to improve reliability and reduce MTTR. Proficient in integrating Datadog with AWS CloudWatch, ServiceNow, PagerDuty, and Slack, and automating monitoring configuration via Terraform, Ansible, and CI/CD pipelines. Automated deployments, monitoring, and workflows using Python, Bash, PowerShell, and Golang, reducing manual toil and improving system reliability. Applied SRE best practices (SLIs, SLOs, error budgets, incident postmortems) to enhance reliability and performance for enterprise-grade systems. Experienced in leading on-call production support, performing incident triage, RCA, and implementing preventive automation to reduce MTTR. Developed and optimized RESTful APIs in Python, Node.js, and Java (Spring Boot) to integrate React front-end, MuleSoft APIs, and cloud-native backends. Integrated DevOps pipelines with security and compliance tooling such as SonarQube, Trivy, Aqua Security, and implemented automated approval gates. Designed self-healing deployment strategies with canary releases, blue/green rollouts, and automated rollback triggers to minimize downtime risk. Migrated legacy workloads and monolith applications to cloud-native architectures on AKS, EKS, and PCF, enabling scalability and cost optimization. Configured enterprise-level monitoring/alerting with Azure Monitor, AWS CloudWatch, App Insights, and Grafana dashboards, reducing MTTD by 35%. Implemented secure secrets management using Azure Key Vault, HashiCorp Vault, and Akeyless for dynamic credential rotation in CI/CD workflows. Managed end-to-end release cycles across Mainframe DB2, Java, .NET Core, and microservices applications, integrating Liquibase, Maven, and Gradle. Designed multi-cloud architectures balancing performance, compliance, and cost across AWS, Azure, and OpenStack environments. Partnered with architects and business stakeholders to modernize infrastructure, streamline cloud adoption, and establish governance frameworks. Mentored and guided DevOps engineers by conducting technical reviews, designing standards, and promoting DevOps/SRE best practices across teams. Delivered resilient, high-availability systems through chaos engineering, load testing, and proactive capacity planning strategies. TECHNICAL SKILLS Cloud Platforms Microsoft Azure Operating Systems Linux, Windows, Unix, CentOS, Debian, Ubuntu and RHEL. CI/CD Tools Jenkins, Azure DevOps Pipelines, GitLab CI/CD, GitHub Actions, Bamboo, Travis CI. Scripting/Programming Languages PowerShell scripting, Bash, YAML, Python, Java11, Node.js, Groovy, Golang, C++ Automation Tools & Configuration Management Terraform, CloudFormation, ARM templates, Ansible, Puppet, Chef. Version Control Tools GitHub, GitLab, Azure Repos, Bitbucket, SVN. Database Technologies SQL Server, MySQL, NoSQL, PostgreSQL, MongoDB, Cassandra, DynamoDB. + Cosmos DB (with TTL management and partitioning strategies), Redis Monitoring tools Dynatrace, Datadog, Splunk, Prometheus, Grafana, Azure monitor, ELK, New Relic. Artifactory Tools Docker Hub, JFrog, ECR, ACR, Nexus. Containerization Tools Docker, Docker Swarm, Kubernetes, OpenShift Build tools Ant, Maven, Gradle. Web Technologies Apache Tomcat 6.x, 7.x, Nginx, IIS, IBM web sphere, HTML5, CSS, JavaScript, jQuery, Bootstrap, XSD, XSL, XPATH, WordPress. Key Vault s Azure Key Vault, HarshCorp Key Vault, Akeyless. Ticketing Tools JIRA, ServiceNow, Bugzilla. CERTIFICATIONS Certified Microsoft Azure administrator PROFESSIONAL EXPERIENCE Client: State Farm Insurance - Remote Jun 2024-Current Role: Sr. Azure DevOps Engineer| SRE Summary: Worked as a Senior DevOps Engineer delivering automated CI/CD pipelines, Infrastructure as Code (Terraform, CloudFormation, ARM), and containerized deployments on Kubernetes, Docker, and PCF across Azure, AWS, and hybrid environments. Implemented enterprise monitoring with Prometheus, Grafana, ELK, and Splunk, and integrated ServiceNow and JIRA workflows to improve reliability, scalability, and security. Responsibilities: Led enterprise-wide migration of CI/CD pipelines from Azure DevOps (ADO) to GitHub Actions, including workflow conversion, secret management, and repository restructuring. Automated build and deployment pipelines using GitHub Actions, Jenkins, and Azure DevOps, integrating code quality and security checks via SonarQube, Trivy, and Checkov. Developed and deployed Java / Spring Boot microservices integrated with REST APIs, ensuring optimized builds and smooth rollout across CI/CD pipelines. Managed Kubernetes (EKS/OpenShift) clusters, automated deployments with Helm and Argo CD, and performed JVM performance tuning to enhance reliability and scalability of Java workloads. Designed reusable GitHub Actions workflows for .NET, Python, TypeScript, and Angular projects, standardizing multi-environment deployment strategies. Developed custom build tasks and YAML templates in Azure DevOps to optimize pipeline performance and reduce build time by 30%. Deployed and managed containerized workloads on GKE and AKS, integrating with Helm, Kustomize, and Argo CD for declarative deployment management. Configured GCP Cloud Monitoring, Cloud Logging, and Alerting Policies to mirror Azure Monitor and Log Analytics, establishing unified visibility across hybrid platforms. Built Prometheus and Grafana dashboards integrating Azure and GCP metrics, optimizing service-level indicators (SLIs) and SLOs. Automated alert routing and incident management workflows between GCP Operations Suite and ServiceNow, standardizing observability practices across both cloud platforms. Created Infrastructure as Code (IaC) using AWS CloudFormation and Terraform for provisioning and maintaining scalable cloud environments. Managed AWS services such as EC2, S3, IAM, Lambda, and CloudFormation stacks as part of DevOps automation workflows. Built Angular and Micro Frontend (MFE) pipelines for distributed front-end applications, integrating unit tests, npm caching, and artifact versioning. Integrated GitHub repositories with AWS CodeArtifact and Azure Artifacts for dependency management and package version control. Designed and implemented Git branching strategies, repository governance, and policy enforcement for GitHub Enterprise migration. Configured GitHub Advanced Security with Dependabot alerts and secret scanning for compliance and secure software delivery. Automated environment provisioning using Python scripts and PowerShell for configuration validation and post-deployment checks. Collaborated with application teams to refactor legacy ADO pipelines to modular GitHub workflows compatible with multiple runtime environments (.NET, Node.js, Python). Implemented SAST/DAST scanning integration with GitHub and ADO pipelines for DevSecOps compliance under FedRAMP and enterprise security frameworks. Migrated ADO boards and work items to GitHub Projects, ensuring seamless Agile transition and traceability. Worked closely with FedRAMP compliance teams to align DevOps automation and infrastructure management with security and audit requirements. Environment: Azure, Azure DevOps, AKS, ARM, Bicep, Terraform, Jenkins, GitHub Actions, JIRA, Grafana, Prometheus, Datadog, Helm, Ansible Tower, PowerShell, Python, MSAL, SonarQube, Trivy, YAML, SQL, Cosmos DB, Azure Synapse, Azure Front Door, Azure Key Vault. Client: State Of New Jersey- Trenton, NJ Jul 2021 - May 2024 Role: Sr DevOps Engineer Summary: Worked on enterprise Azure DevOps initiatives, implementing automation, cloud infrastructure provisioning, CI/CD, container orchestration, and data platform integration. Focused on building secure, scalable systems leveraging Azure services, Infrastructure as Code, and monitoring tools for enhanced operational visibility and system performance. Responsibilities: Migrated on-premises workloads to Azure cloud by building scalable IaC frameworks with Terraform modules, ARM templates, and Bicep, standardizing VNETs, NSGs, and resource provisioning across multiple agencies. Implemented PowerShell and CLI scripting automation for identity and access management, storage lifecycle policies, and operational runbooks. Deployed Azure Monitor, Log Analytics, and Application Insights via IaC for observability, creating dashboards and alerts for proactive monitoring. Delivered compliance-aligned infrastructure by integrating Terraform and Bicep deployments with GitHub Actions CI/CD pipelines, reducing drift and ensuring audit readiness. Integrated RESTful API calls in GitHub Actions workflows for dynamic deployment and environment setup. Built and maintained Azure Monitor dashboards and integrated custom telemetry with App Insights for pipeline health tracking. Integrated Azure Event Hub and Azure Service Bus for event-driven data ingestion and processing pipelines. Developed complex Ansible playbooks and custom roles to automate provisioning, configuration, and deployment on Azure resources. Created and managed Azure AD users, group policies, role-based access control (RBAC), and LDAP-based authentication. Implemented performance monitoring and visualization using Azure-native tools and Grafana integrated with Azure Metrics. Developed automation scripts using Python and PowerShell to support deployment tasks and infrastructure monitoring. Streamlined Azure SQL database management, performed query optimization, and managed secure access and roles. Worked with Informatica to support Azure-based ETL and data integration pipelines for data warehousing workloads. Conducted email platform migrations in Azure with detailed dependency mapping and proactive performance monitoring. Defined and deployed Service Mesh policies using Istio on AKS, including mTLS encryption and advanced routing. Used Kube-builder for creating custom Kubernetes CRDs in AKS clusters to manage application deployment logic. Developed YAML configurations and Helm templates for declarative infrastructure deployments. Designed and configured dashboards using Grafana and Azure dashboards for real-time metrics monitoring. Integrated Dynatrace and Datadog with Azure environments to improve visibility into system performance. Led initiatives to implement SLOs and SLIs across critical services hosted in Azure, improving reliability and uptime. Created Groovy-based Ansible playbooks for configuration automation and Golang tools for Azure provisioning. Migrated legacy monolith services to microservices hosted in Azure using containerized Spring Boot and React applications. Created full-stack applications using Node.js (Express) for REST APIs and Angular for UI components with secure integration via Azure AD. Used Confluence and Jira to maintain documentation, automate sprint reporting, and manage DevOps project workflow. Environment: Azure DevOps, Azure Synapse, Azure Data Factory, Azure Monitor, Azure AD, Azure SQL, AKS, GitHub Actions, Databricks, Helm, Ansible, Terraform, PowerShell, Python, YAML, Grafana, Dynatrace, Istio, Kube-builder, Confluence, Jira. Client: PNC Bank- Pittsburgh, PA Jul 2019 - May 2021 Role: Cloud Automation and Infrastructure Summary: Served as a DevOps Engineer supporting multiple development and system analysis teams to implement CI/CD automation, Azure integrations, OpenShift containerization, and enterprise-grade monitoring. Focused on optimizing infrastructure using scripting, Ansible Tower, and Grafana, while driving continuous improvement initiatives. Contributed to hybrid cloud transformation by provisioning secure, scalable Azure environments and streamlining deployments across development and production landscapes. Responsibilities: Worked with five scrum teams (Java, AEM, Jenkins, Ant, Maven, SVN, Git, Agile methodology, Cucumber scripts, SonarQube, XL Deploy, XL Release, SharePoint) to build CI/CD automation from scratch. Deployed Active Directory domain controllers to Microsoft Azure using Azure VPN Gateway and handled DNS/identity sync configurations. Automated infrastructure provisioning using PowerShell scripts and ARM templates for core Azure services. Implemented end-to-end CI/CD pipelines using Azure DevOps (VSTS) and integrated with Git repos, SonarQube, and build tools. Created scripts in Bash, Python, and PowerShell to automate backup, monitoring, disk cleanup, and reporting tasks. Designed and configured monitoring dashboards using Grafana, including log-based and metric-based alerting. Automated system health tracking by integrating Grafana APIs with custom scripts and log pipelines. Supported integration workflows in a government healthcare and records processing system. Implemented and managed microservices-based architecture using OpenShift on Azure, supporting rolling deployments. Specialized in configuring and managing Azure Red Hat OpenShift (ARO) clusters, ensuring seamless scaling and patching. Built and pushed containerized images using Docker and managed version control via Git for all microservices. Created Helm charts for OpenShift deployments to standardize and templatize service provisioning. Used Ansible Tower to automate patching, deployment validation, and post-deployment testing across environments. Developed health and audit dashboards by connecting Ansible Tower APIs to monitoring frameworks. Deployed Dynatrace OneAgent and integrated custom application metrics into dashboards for real-time insight. Configured Azure Monitor with custom log queries to track pipeline status, VM performance, and OpenShift cluster usage. Integrated Azure Key Vault with CI/CD pipelines to manage secrets, connection strings, and service credentials securely. Assisted in configuring Azure Front Door to route traffic securely across staging and production clusters. Participated in Agile sprint planning, release management, incident tracking, and RCA documentation via Jira and Confluence. Environment: Azure, Azure VPN Gateway, Azure DevOps (VSTS), Azure Monitor, Azure Key Vault, Azure Front Door, Red Hat OpenShift (ARO), Docker, Jenkins, Ansible Tower, PowerShell, Python, Bash, Grafana, Dynatrace, Helm, Maven, Ant, Git, SVN, XL Deploy, XL Release, SonarQube, SharePoint, Jira, Confluence. Client: American Airlines- Dallas, TX Dec 2018 to June 2019 Role: Build And Release Engineer Summary: Supported Linux and Windows-based environments for CI/CD automation, infrastructure setup, and application release. Led efforts in Ansible scripting, Jenkins orchestration, and Azure-integrated CI/CD workflows. Ensured enterprise-grade reliability for Java-based apps by automating deployment and maintenance tasks. Responsibilities: Installed and configured Red Hat Linux 4 and Windows NT servers for stable development and production environments. Performed daily Linux system administration tasks, including user account setup, directory services, logon scripts, and file system permissions. Configured key network services: DNS, NFS, NIS, and NTP to enhance system reliability and connectivity. Deployed and maintained Apache Tomcat and JBoss servers to host enterprise applications. Used Ansible for configuration management, automating tasks like patching, service restarts, and software installations. Built and maintained CI/CD pipelines using Jenkins, Git, and Maven, integrating code, builds, and tests across environments. Set up Jenkins master-slave architecture for distributed builds and enhanced parallel execution. Integrated Apache Maven for managing Java project builds and dependencies within Jenkins pipelines. Automated operational tasks such as backups, monitoring, system cleanup, and log rotation using Shell scripts and Ansible. Migrated build and deployment processes to Azure DevOps Pipelines for better integration and governance. Designed and implemented CI/CD workflows in Azure DevOps, enabling seamless code integration, artifact creation, and deployment to staging environments. Used Azure Repos and Git branching strategies for version control and release management. Created ARM templates for provisioning infrastructure and automated deployments using PowerShell and Azure CLI. Set up Azure Monitor and Log Analytics for tracking infrastructure health and application performance. Used Azure Key Vault to securely manage secrets and service connection credentials within pipelines. Designed dashboards in Azure DevOps for tracking build health, release status, and environment performance metrics. Environment: Azure DevOps, Red Hat Linux 4, Windows NT, Apache Tomcat, JBoss, DNS, NFS, Ansible, Jenkins (master/slave), Maven, Git, Azure Pipelines, Azure Repos, Shell Scripting, PowerShell, Azure Monitor, Azure Key Vault, ARM templates. Client: Value MomentumSoftware Services Pvt Ltd-India Sep 2012 to Dec 2015 Role: Linux Administrator Summary: Supported Linux infrastructure administration across multiple business units. Automated system tasks using scripting, managed production environments, configured network services, and ensured system availability using monitoring tools like Nagios. Responsibilities: Installed, configured, and patched RHEL 3.x/4.x systems using Kickstart and Jumpstart for consistent deployments. Administered Linux and UNIX systems; handled user/group accounts, LVM, disk management, and periodic updates. Configured core services: DNS, DHCP, FTP, SSH, NIS, LDAP, and Squid for enterprise environments. Wrote Python and shell scripts to automate log monitoring, disk space tracking, and service restarts. Used Nagios to monitor system and application health; created alerting rules and responded to incidents. Resolved network issues using tools like ping, traceroute, tcpdump for diagnostics and performance tuning. Reviewed open tickets, conducted root cause analysis, and closed incidents via BMC Remedy. Managed services, rotated logs, and implemented basic real-time backups for web server directories. Environment: RHEL 3.x/4.x, Linux, UNIX, Kickstart, DNS, DHCP, FTP, SSH, NIS, LDAP, Squid, Nagios, Python, Shell Scripting, BMC Remedy, VMware. Keywords: cplusplus continuous integration continuous deployment user interface javascript sthree database active directory Michigan New Jersey Pennsylvania Texas |